Question

In: Computer Science

Case Study-Insurance Company Network Design [5 x 3=15 Marks] Care super insurance company has 150 computers...

Case Study-Insurance Company Network Design [5 x 3=15 Marks]
Care super insurance company has 150 computers that are networked together. It also has four
servers and uses a star topology wired network to reach employees' offices, with a bus
interconnecting four floors in its office building. Because of a staggering influx of Internet business,
the network administrator's task is to boost network performance and availability as much as
possible. The company also wants a network design that's easy to reconfigure and change because
workgroups form and disband frequently and their membership changes regularly. All computers
must share sensitive data and control access to customer files and databases. Aside from customer
information and billing databases, which run on all servers, employees' desktop computers must run
standard word-processing and spreadsheet programs.
Use the following write-on lines to evaluate the requirements for this network. After you finish,
determine the best network topology or topology combination for the company. On a blank piece of
paper, sketch the network design you think best suits company needs. Remember: High performance
and easy reconfiguration are your primary design goals!
a. Design a Network topology for the given scenario.
b. Will the network be peer-to-peer or server based? Justify your answer.
c. Analyse business goals for this network.
d. Analyse business priorities for this network.
e. Investigate business constraints for this network.

Solutions

Expert Solution

a) Network Topology: They can use extended star topology fot the entire system.Each floor server can be used to fetch the data and one server can be used in star network and remaining one can be used to connect the entire system.

b) The network will be server based as we have 4 servers and they can be used in efficient way for better performance.

c) It is beneficial for short-distance communication which can be used in offices, homes, computer labs, and small buildings where the local area network is established. The other benefit of using an it is that all the nodes can be managed from one point which is a central hub. The central hub has the content addressable memory (cam) table which is used to store the address of all nodes so that all the information of connected nodes can be managed properly by the central hub. for e.g. if Node X wants to send any message to Node Y. The network failure probability can be reduced by using the extended star topology. AS the nodes are connected to one central hub there is less chance that the network will fail as the nodes are independent of each other and they are directly connected to only one central hub or switch.

If you keep in mind the changes in business strategies and enterprise networking discussed in the previous sections, it becomes possible to list some typical network design business goals:

  • Increase revenue and profit

  • Increase market share

  • Expand into new markets

  • Increase competitive advantages over companies in the same market

  • Reduce costs

  • Increase employee productivity

  • Shorten product-development cycles

  • Use just-in-time manufacturing

  • Plan around component shortages

  • Offer new customer services

  • Offer better customer support

d) Organizations need to plan out specific models, follow crucial guidelines, and create physical and logical layouts of a network or a configuration map to achieve optimal network performance.Star topology has several advantages that make it the most-used network configuration.If the organization plans to upscale the network infrastructure later, teams should consider choosing a scalable topology unaffected by adding devices. Star topology is an ideal choice for this requirement as it shows minimal disruption when adding nodes.

e) Analyzing Business Constraints

In addition to analyzing business goals and determining your customer's need to support new and existing applications, it is important to analyze any business constraints that will affect your network design.

Politics and Policies

It has been said that there are two things not to talk about with friends: politics and religion. It would be nice if you could escape discussing office politics and technological religion (technology preferences) with a network design customer, but avoiding these topics puts your project at risk.

In the case of office politics, your best bet is to listen rather than talk. Your goal is to learn about any hidden agendas, turf wars, biases, group relations, or history behind the project that could cause it to fail. In some cases, a similar project was already tried and didn't work. You should determine if this has happened in your case and, if it has, the reasons why the project failed or never had a chance to come to fruition.

Pay attention to personnel issues that could affect the project. Which manager or managers started the project and how much do they have at stake? Are there any managers, network engineers, or users who want the project to fail for any reason? Find out who your advocates and opponents are. In some cases, no matter how technically sound your network design is, there will be people who have a negative reaction to it.

Be sure to find out if your project will cause any jobs to be eliminated. Some network design projects involve automating tasks that were once done by highly paid workers. These workers will obviously have reasons to want the project to fail.

Be prepared for the possibility of formidable office politics if your network design project involves the merging of voice and data networks. Voice experts and data experts have traditionally lived in their own worlds. They may face each other with some mistrust and fear for the future. You can often reduce the uncertainty by running short IP telephony seminars for voice technicians and traditional telephony seminars for the data network administrators.

While working with a client, you will gain a feeling for the client's business style. One aspect of style that is important to understand is tolerance to risk. Is risk taking rewarded in the company, or are most people afraid of change? Knowing the employment history of the decision-makers will help you select appropriate technologies. The employment history of the decision-makers affects their tolerance to risk and their biases toward certain technologies. Understanding these issues will help you determine if your network design should be conservative or if it can include new, state-of-the art technologies and processes.

Another aspect of the client's business style has to do with testing the design. At some companies, the testers might claim they have carefully tested a new Voice over IP (VoIP) implementation, for example, when what they really did was get a VoIP call to complete. Your idea of testing, on the other hand, might be to make numerous calls under various load conditions. See Chapter 12, "Testing Your Network Design," for more information on testing.

It is important that you discuss with your customer any policies (religion) regarding protocols, standards, and vendors. Try to learn of any "forbidden technologies" where the users or network engineers have decided, possibly for the wrong reasons, that a particular protocol is slow or unstable.

Find out if the company has standardized on any transport, routing, desktop, or other protocols. Determine if there is any doctrine regarding open versus proprietary solutions. Find out if there are any policies on approved vendors or platforms. In many cases, a company has already chosen technologies and products for the new network and your design must fit into the plans. Ask your customer if there are any policies regarding distributed authority for network design and implementation. For example, are there departments that control their own internetworking purchases? Find out if departments and end users are involved in choosing their own applications. Make sure you know who the decision-makers are for your network design project.

A lot of organizations need to implement policies in response to legal, regulatory, or contractual requirements. In the United States, Generally Accepted Accounting Principles (GAAPs) drive many accounting policies. In the medical profession, network designs may be affected by security and privacy policies that are regulated by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. In other parts of the world, network equipment choices may be regulated by governmental Postal, Telegraph, and Telephone (PTT) organizations.

In the rush to get to technical requirements, network designers sometimes ignore nontechnical issues, which is a mistake. Many brilliant network designs have been rejected by a customer because the designer focused on the lower layers of the OSI reference model and forgot about company politics and technical religion.

Budgetary and Staffing Constraints

Your network design must fit the customer's budget. The budget should include allocations for equipment purchases, software licenses, maintenance and support agreements, testing, training, and staffing. The budget might also include consulting fees (including your fees) and outsourcing expenses.

Throughout the project, work with your customer to identify requirements for new personnel, such as additional network managers. Point out the need for personnel training, which will affect the budget for the project.

In general, it is a good idea to analyze the abilities of the networking staff. How much in-house expertise is there? Should you recommend any training or outsourcing for network operations and management? The technologies and protocols that you recommend will depend on the abilities of internal staff. It is not a good idea to recommend a complex routing protocol, such as Open Shortest Path First (OSPF), for example, if the engineering staff is just starting to learn internetworking concepts (unless you also recommend a comprehensive training plan).

Analyzing in-house expertise is especially important and challenging for companies that merge their voice and data networks. Consider the need to train the traditional voice experts on data technologies and the data experts on voice technologies. Also, implementing voice and video often requires advanced QoS knowledge that may necessitate training.

To ensure the success of your project, determine who controls the network budget—the Information Systems (IS) department, network managers, or users' departments? How much control do users and groups have over network expenditures? Are there any departmental charge-back schemes?

Regardless of who controls the budget, one common network design goal is to contain costs. Reduced budgets or limited resources often force network designers to select the most affordable solution instead of the best solution. It is useful to know the areas in which the network design can be changed with the least effect on performance to meet budget requirements. Chapter 2 discusses typical tradeoffs that must be made to meet the goal of affordability while achieving good performance and reliability.

If possible, work with your customer to develop a return on investment (ROI) analysis for the network design. Make a business case to the customer that explains how quickly the new network will pay for itself, due to reduced operational costs, improved employee productivity, or the enabling of higher revenue potential and market expansion.

Project Scheduling

An additional business-oriented topic that you should review with your customer is the timeframe for the network design project. When is the final due date and what are the intermediate and major milestones? In most cases, management of the project schedule is the customer's obligation, not yours, but you should ask the customer to give you a copy of the schedule and to keep you informed about any slips in the schedule.


Related Solutions

Care super insurance company has 150 computers that are networked together. It also has four servers...
Care super insurance company has 150 computers that are networked together. It also has four servers and uses a star topology wired network to reach employees' offices, with a bus interconnecting four floors in its office building. Because of a staggering influx of Internet business, the network administrator's task is to boost network performance and availability as much as possible. The company also wants a network design that's easy to reconfigure and change because workgroups form and disband frequently and...
Care super insurance company has 150 computers that are networked together. It also has four servers...
Care super insurance company has 150 computers that are networked together. It also has four servers and uses a star topology wired network to reach employees' offices, with a bus interconnecting four floors in its office building. Because of a staggering influx of Internet business, the network administrator's task is to boost network performance and availability as much as possible. The company also wants a network design that's easy to reconfigure and change because workgroups form and disband frequently and...
11. Write an application case study with network design diagram including the following topics: [10 Marks]...
11. Write an application case study with network design diagram including the following topics: [10 Marks] - IoT - Bluetooth - Fog Computing - Redundant - Resilient and measures of resilience - Troubleshooting with half split and move method Highlight in bold each of the above keywords.
Case study: (5 Marks) Mrs X is 35 and is in need of dialysis. She is...
Case study: Mrs X is 35 and is in need of dialysis. She is refusing treatment because she is scared of the treatment which she believes is invasive. She has been counseled about the nature of the treatment - there are no alternatives that would be of practical benefit. She is competent to make treatment decisions. She understands that if she refuses dialysis she will die. She has a daughter of 15 years who lives at home. The clinician feels...
[5 marks] An organization has 2 server computers and a number of desktop computers and a...
[5 marks] An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and the other one is the web server (IP address: w1.w2.w3.w4)....
enario 1:       (Total = 3 x 5 = 15 Marks) Western Sydney Steaks (WSS), a...
enario 1:       (Total = 3 x 5 = 15 Marks) Western Sydney Steaks (WSS), a national fast-food chain, has experienced a number of problems in the past few years, and management is considering the adoption of a balanced scorecard as part of a turnaround effort. You are one of the renowned Management Accountants in the city. WSS’s CEO has requested you to submit a report highlighting the potential benefits of using balanced scorecard over traditional management accounting tools. You...
QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from:...
QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from: [Brooks hear. ICT Services Management (Custom Edition EBook), Pearson Education Australia, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com] Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each...
Case Study 1. Locate and research a Case Study for Long Term Care Insurance Fraud. Summarize...
Case Study 1. Locate and research a Case Study for Long Term Care Insurance Fraud. Summarize the case study. Which party committed the fraud and explain with specific facts why it may or may not have been fraudulent? Describe the consequences either party endured due to the fraudulent act. You can start your research using the following websites: http://www.irs.gov http://library.cw.edu/ The report should be of 2 pages and submit your document in a Word format.
Write an application case study with network design diagram including the following topics: - IoT -...
Write an application case study with network design diagram including the following topics: - IoT - Bluetooth - Fog Computing - Redundant - Resilient and measures of resilience - Troubleshooting with half split and move method Highlight in bold each of the above keywords.
Write an application case study with network design diagram including the following topics: - IoT -...
Write an application case study with network design diagram including the following topics: - IoT - Bluetooth - Fog Computing - Redundant - Resilient and measures of resilience - Troubleshooting with half split and move method Highlight in bold each of the above keywords.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT